vi. Information Assurance – availability and protection of information – organizations can classify information and decide on access levels and levels of protection; a typical diagram would show what types of information are going to be accessible to the public, versus what types of information will be available to all employees versus what types of information will be available to specific groups

vii. Organizations should define threats in three terms:

1. Adversaries – terrorists, disgruntled employees, competitors

2. Motivations – DOS, theft, challenges , etc

3. Classes of attacks

a. Passive – these attacks include monitoring of communications and passwords

About INE Instructor:

Leave a Reply

Currently you have JavaScript disabled. In order to post comments, please make sure JavaScript and Cookies are enabled, and reload the page.Click here for instructions on how to enable JavaScript in your browser.